Files
geutebruck/analyze_mapping_structure.py
Administrator 14893e62a5 feat: Geutebruck GeViScope/GeViSoft Action Mapping System - MVP
This MVP release provides a complete full-stack solution for managing action mappings
in Geutebruck's GeViScope and GeViSoft video surveillance systems.

## Features

### Flutter Web Application (Port 8081)
- Modern, responsive UI for managing action mappings
- Action picker dialog with full parameter configuration
- Support for both GSC (GeViScope) and G-Core server actions
- Consistent UI for input and output actions with edit/delete capabilities
- Real-time action mapping creation, editing, and deletion
- Server categorization (GSC: prefix for GeViScope, G-Core: prefix for G-Core servers)

### FastAPI REST Backend (Port 8000)
- RESTful API for action mapping CRUD operations
- Action template service with comprehensive action catalog (247 actions)
- Server management (G-Core and GeViScope servers)
- Configuration tree reading and writing
- JWT authentication with role-based access control
- PostgreSQL database integration

### C# SDK Bridge (gRPC, Port 50051)
- Native integration with GeViSoft SDK (GeViProcAPINET_4_0.dll)
- Action mapping creation with correct binary format
- Support for GSC and G-Core action types
- Proper Camera parameter inclusion in action strings (fixes CrossSwitch bug)
- Action ID lookup table with server-specific action IDs
- Configuration reading/writing via SetupClient

## Bug Fixes
- **CrossSwitch Bug**: GSC and G-Core actions now correctly display camera/PTZ head parameters in GeViSet
- Action strings now include Camera parameter: `@ PanLeft (Comment: "", Camera: 101028)`
- Proper filter flags and VideoInput=0 for action mappings
- Correct action ID assignment (4198 for GSC, 9294 for G-Core PanLeft)

## Technical Stack
- **Frontend**: Flutter Web, Dart, Dio HTTP client
- **Backend**: Python FastAPI, PostgreSQL, Redis
- **SDK Bridge**: C# .NET 8.0, gRPC, GeViSoft SDK
- **Authentication**: JWT tokens
- **Configuration**: GeViSoft .set files (binary format)

## Credentials
- GeViSoft/GeViScope: username=sysadmin, password=masterkey
- Default admin: username=admin, password=admin123

## Deployment
All services run on localhost:
- Flutter Web: http://localhost:8081
- FastAPI: http://localhost:8000
- SDK Bridge gRPC: localhost:50051
- GeViServer: localhost (default port)

Generated with Claude Code (https://claude.com/claude-code)

Co-Authored-By: Claude Sonnet 4.5 <noreply@anthropic.com>
2025-12-31 18:10:54 +01:00

136 lines
5.3 KiB
Python

#!/usr/bin/env python3
"""Analyze the exact binary structure of an action mapping"""
def analyze_mapping_at_offset(filepath, offset, size=600):
"""Extract and analyze mapping at specific offset"""
with open(filepath, 'rb') as f:
f.seek(offset)
data = f.read(size)
print(f"Analyzing mapping at offset {offset} (0x{offset:X})")
print("=" * 80)
# Print hex dump with annotations
print("\nHEX DUMP:")
print("-" * 80)
i = 0
while i < len(data):
# Address
addr = offset + i
print(f"{addr:06X}: ", end="")
# Hex bytes (16 per line)
hex_bytes = []
ascii_chars = []
for j in range(16):
if i + j < len(data):
byte = data[i + j]
hex_bytes.append(f"{byte:02X}")
if 32 <= byte <= 126:
ascii_chars.append(chr(byte))
else:
ascii_chars.append(".")
else:
hex_bytes.append(" ")
ascii_chars.append(" ")
print(" ".join(hex_bytes[:8]) + " " + " ".join(hex_bytes[8:]), end="")
print(" " + "".join(ascii_chars))
i += 16
# Parse structure
print("\n\nSTRUCTURE ANALYSIS:")
print("-" * 80)
i = 0
# Check for marker
if data[i:i+4] == b'ules':
print(f"[{i:04d}] Marker: 'ules' (action mapping marker)")
i += 4
elif i > 0 and data[i-1] == 0x05 and data[i:i+4] == b'ules':
print(f"[{i-1:04d}] 0x05 - Marker type byte")
print(f"[{i:04d}] Marker: 'ules' (action mapping marker)")
i += 4
# Look for length byte
if i < len(data):
print(f"[{i:04d}] Length byte: 0x{data[i]:02X} ({data[i]} bytes)")
marker_name_len = data[i]
i += 1
# The "marker name" actually contains the entire mapping data
print(f"[{i:04d}] Marker name/data section ({marker_name_len} bytes):")
# Parse properties within the marker name
props_start = i
props_found = 0
j = 0
while j < min(marker_name_len, 200):
# Property pattern: 01 <len> <.name> <value_marker> <value>
if data[i+j] == 0x01 and j + 2 < marker_name_len:
prop_name_len = data[i+j+1]
if prop_name_len > 0 and prop_name_len < 50 and j + 2 + prop_name_len < marker_name_len:
prop_name = data[i+j+2:i+j+2+prop_name_len].decode('utf-8', errors='ignore')
if prop_name.startswith('.'):
print(f" [{i+j:04d}] Property marker: 0x01")
print(f" [{i+j+1:04d}] Name length: {prop_name_len}")
print(f" [{i+j+2:04d}] Name: '{prop_name}'")
# Check value type
val_offset = i + j + 2 + prop_name_len
if val_offset < len(data):
val_marker = data[val_offset]
if val_marker == 0x01: # Boolean
val = data[val_offset+1] if val_offset+1 < len(data) else 0
print(f" [{val_offset:04d}] Value type: 0x01 (boolean)")
print(f" [{val_offset+1:04d}] Value: {val} ({'True' if val else 'False'})")
elif val_marker == 0x04: # Integer
if val_offset + 4 < len(data):
val = int.from_bytes(data[val_offset+1:val_offset+5], 'little')
print(f" [{val_offset:04d}] Value type: 0x04 (integer)")
print(f" [{val_offset+1:04d}] Value: {val}")
elif val_marker == 0x00: # Null
print(f" [{val_offset:04d}] Value type: 0x00 (null)")
props_found += 1
j += 2 + prop_name_len + 2 # Skip property
continue
# Action pattern: 07 01 40 <len_u16> <action_string>
if data[i+j:i+j+3] == b'\x07\x01\x40' and j + 5 < marker_name_len:
action_len = int.from_bytes(data[i+j+3:i+j+5], 'little')
if action_len > 0 and action_len < 300 and j + 5 + action_len <= marker_name_len:
action_str = data[i+j+5:i+j+5+action_len].decode('utf-8', errors='ignore')
print(f" [{i+j:04d}] Action marker: 0x07 0x01 0x40")
print(f" [{i+j+3:04d}] Action length: {action_len} (0x{action_len:04X})")
print(f" [{i+j+5:04d}] Action string: '{action_str}'")
j += 5 + action_len
continue
j += 1
print(f"\nFound {props_found} properties in marker data")
print("\n" + "=" * 80)
if __name__ == '__main__':
# Analyze a new mapping from the modified file
# Let's analyze mapping #37 at offset 267315
print("ANALYZING NEW MAPPING")
print("Mapping #37 from TestMKS_added_mapping.set")
print()
analyze_mapping_at_offset('TestMKS_added_mapping.set', 267315, 600)
# Also show the first mapping for comparison (has parameters)
print("\n\n\n")
print("ANALYZING FIRST MAPPING (WITH PARAMETERS)")
print("Mapping #1 from TestMKS_added_mapping.set")
print()
analyze_mapping_at_offset('TestMKS_added_mapping.set', 252173, 600)